News Clip2:44
Curated Video

Apple Boosts iPhone Security After Spyware Find

Higher Ed
FOR CLEAN VERSION SEE STORY NUMBER: apus061994APPLE ISSUED AN IPHONE SECURITY UPDATE AFTER RESEARCHERS UNCOVERED POWERFUL ESPIONAGE SOFTWARE ON AN ACTIVIST'S PHONE IN THE MIDDLE EAST. APPLE IN A STATEMENT SAYS IT FIXED THE VULNERABILITY...
Instructional Video5:20
Curated Video

Practical Cyber Hacking Skills for Beginners - Malware Revisited

Higher Ed
This video revisits the concepts of malware, the kinds of malware, and the options available to us to mitigate the problem as much as possible.
Instructional Video10:08
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Understanding Malware and Anti-Malware Products

Higher Ed
In this video, you will learn about malware and the various anti-malware products. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about...
Instructional Video7:21
Curated Video

The Science of Online Advertising: How Your Preferences Are Tracked

6th - Higher Ed
Discover how online advertising is tailored to individual preferences through sophisticated tracking technologies. Learn about the use of cookies, which gather data about your browsing habits to serve targeted ads. Explore the...
Instructional Video10:06
Curated Video

The Modern Spy: How Your Daily Devices Can Be Compromised

6th - Higher Ed
In an age where technology is intertwined with daily life, learn how easily your devices can be hacked and used for spying. From mobile phones to computers, discover the methods used by modern spies to infiltrate your privacy. Follow...
Instructional Video8:38
Curated Video

Modern Espionage: How Your Privacy is Being Compromised

6th - Higher Ed
Discover the surprising ways in which your privacy can be invaded in the modern world. From hidden cameras in everyday objects to sophisticated hacking techniques, learn how spies can access your Smartphone, computer, and even capture...
Instructional Video1:40
Curated Video

Internet Security Threats: The Rise of Financially Motivated Hackers

Pre-K - Higher Ed
The video highlights the shift in motivations of modern computer hackers towards financial gain, with a rise in attacks involving identity theft, extortion, and fraud. Symantec's report reveals the prevalence of phishing messages,...
Instructional Video2:47
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Viruses and Spyware

Higher Ed
Viruses and spyware are the two major forms of mobile malware, and this video explains what viruses and spyware are and how to protect your mobile device from them. This clip is from the chapter "Mobile Threats and Countermeasures" of...
Instructional Video2:47
Packt

Viruses and Spyware

Higher Ed
Viruses and spyware are the two major forms of mobile malware, and this video explains what viruses and spyware are and how to protect your mobile device from them. This clip is from the chapter "Mobile Threats and Countermeasures" of...
Instructional Video2:03
Curated Video

How to Protect Your Data

Higher Ed
This video introduces different techniques on how to protect your data
Instructional Video37:12
IDG TECHtalk

Apple introduces the A15-powered iPhone 13, plus iOS 14.8 patches Pegasus spyware flaw

Higher Ed
Apple announced its latest additions to its iPhone lineup, as well as a new iPad mini, at its "California Streaming" event on Tuesday. Both devices will be powered by Apple's new A15 Bionic processor. Macworld executive editor Michael...
Instructional Video28:25
IDG TECHtalk

Pegasus spyware and iPhone security

Higher Ed
Amnesty International's Security Lab revealed that a handful of iPhones, mostly belonging to journalists and human rights activists, were successfully infected with Pegasus spyware. While the majority of iPhones users are not affected,...
Instructional Video1:09
Next Animation Studio

U.S. and allies accuse China of serious ransomware crimes

12th - Higher Ed
Beijing is being accused of supporting Chinese officials who hire hackers to steal from individuals and firms worldwide.
Instructional Video4:12
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities

Higher Ed
This video explains a deeper dive look at IT vulnerabilities. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for...
Instructional Video1:05
Next Animation Studio

Israeli spyware used by Saudi murderers, regimes worldwide

12th - Higher Ed
The Washington Post reports that an Israeli company sold “military-grade spyware” that can easily bypass a smartphone’s passwords and access all data on that phone.
Stock Footage0:30
Getty Images

Eye Matrix Cube

Pre-K - Higher Ed
An animation with a rotating matrix cube and an Eye symbol
Stock Footage0:30
Getty Images

Padlock Matrix Cube

Pre-K - Higher Ed
An animation with a rotating matrix cube and a Padlock symbol.
Stock Footage0:29
Getty Images

Computer hacking concept with a businesswoman and a pirate stealing data.

Pre-K - Higher Ed
Computer hacking concept with a businesswoman and a pirate stealing data.
Stock Footage0:29
Getty Images

Danger online

Pre-K - Higher Ed
Danger online
Stock Footage0:30
Getty Images

Danger online

Pre-K - Higher Ed
Danger online
Stock Footage0:13
Getty Images

Internet pirate preparing a new attack.

Pre-K - Higher Ed
Internet pirate preparing a new attack.
Stock Footage0:19
Getty Images

Danger online

Pre-K - Higher Ed
Danger online
News Clip3:30
AFP News Agency

CLEAN : Hungarians protest against government's alleged use of Pegasus spyware

9th - Higher Ed
Hungarians march in Budapest to protest against the government's alleged use of the Israeli-made Pegasus spyware technology to target hundreds of phone numbers, including those of journalists (Footage by AFPTV via Getty Images)
News Clip2:38
AFP News Agency

CLEAN : Hungary spying accusations heighten media freedom concerns

9th - Higher Ed
Those rights of mine were seriously violated" says journalist Szabolcs Panyi after claims that Hungary used Israeli-made spyware to target journalists and others (Footage by AFPTV via Getty Images)